Thursday 31 May 2012

: Max Payne 3 PC System Requirements :



Max Payne 3 PC System Specifications:-

LOWEST TESTED SPECS
Windows 7/Vista/XP PC (32 or 64 bit) 
Intel Dual Core 2.4 GHZ or AMD Dual Core 2.6 GHZ, or better 
2GB System RAM 
NVIDIA® GeForce 8600 GT 512MB RAM or AMD Radeon™ HD 3400 512MB RAM

LOW RECOMMENDED SPECS
Windows 7/Vista/XP PC (32 or 64 bit)
 Intel Dual Core 3GHz or AMD equivalent
3GB System RAM 
NVIDIA® GeForce 450 512MB RAM or AMD Radeon™ HD 4870 512MB RAM

HIGH RECOMMENDED SPECS
Windows 7/Vista (32 or 64 bit)
Intel i7 Quad Core 2.8Ghz or AMD equivalent
3GB System RAM
NVIDIA® GeForce 480 1GB RAM or AMD Radeon™ HD 5870 1GB RAM

HIGHEST TESTED SPECS
Windows 7/Vista (64 bit)
Intel i7 3930K 6 Core x 3.06 GHZ or AMD FX8150 8 Core x 3.6 GHZ 
16GB System RAM 
NVIDIA® GeForce® GTX 680 2GB RAMor AMD Radeon™ HD 7970 3GB RAM

OTHER REQUIREMENTS
HDD Space: 35 GB
Sound Card: 100% Direct X 9.0 compatible – Direct X 9.0 compatible supporting Dolby Digital Live

Saturday 26 May 2012

HOW TO ROOT YOUR ANDROID DEVICE

Today I will tell you how to root your android device easily. This process works in almost all the devices but if your device won't root, then tell me. I will post one dedicated for that phone !!




If you don't know what is rooting , then i would suggest you to read a post in this blog about what rooting is exactly !!

** PLEASE NOT THAT THIS BLOG IS NOT RESPONSIBLE IF YOU ACCIDENTALLY BRICK YOUR PHONE **

** YOU SHOULD DO THESE ONLY IF YOU UNDERSTAND WHAT RISKS ARE INVOLVED** 

Follow These Steps Very carefully One by One

1. Download Superoneclick 2.2 


After downloading extract it anywhere you please. Now go to ur system folder i.e where you have installed your OS (i.e Win xp, win 7 etc) Lets say its in the 'X' Drive. So go to X:/WINDOWS/system32/cmd.exe and copy it, now go to where you installed Superoneclick. Inside the folder there'll be a folder as "ADB" open it and paste the 'cmd.exe' you copied.

2. Download Your Device ADB drivers

You can find these drivers easily by searching in google.com. Go to google and type your model name followed by adb drivers. They should be available for download.
* install the drivers after downloading them *


3. Connect your Device

After installing the Drivers Connect Your Optimus Net using the data cable. In your Device go to settings>Applications>Development>USB Debbuging. Check the box beside it. It will give you a warning just click OK. When you connect your Device you will see 'Turn USB storage on" option DO NOT TURN IT ON. After connecting you will see in the notification bar that "USB Debbuging On" it means you have done evrythng ok uptil now. 

Now before rooting Go to settings>Storage>Unmount SD Card it will ask you if you want to unmount click OK. After it is unmounted you can begin rooting. MAKE SURE YOU UNMOUNT THE SD CARD OTHERWISE IT MAY BE COMPLETELY ERASED.

4. Now Let's Root

Now Go to the ADB folder. Remember the cmd.exe you pasted there? Click on it.

WINDOWS 7 USERS MAKE SURE BEFORE CLICKING CMD YOU RIGHT CLICK AND CLICK ON 'RUN AS ADMINISTRATOR' AND ALLOW

In the commands write the following:- [Give the exact spaces i have given OTHERWISE IT WILL NOT WORK!!]:-

adb devices (press enter)(after this command you should see your device id)
adb shell (press enter) (after this command you should see $ sign)
$ echo 1 >/data/local/lge_adb.conf (press enter)

DO NOT CLOSE THE WINDOW JUST MINIMIZE IT!!

Now go to Where you extracted Superoneclick and click on superoneclick.exe.

In the window on the Top Left hand Side of the window there will be an option 'ROOT'.
CLick on it!
it doesnot come on 3.4+
now i am rebooting my device

note:::[+] Rush did it ! It's a GG, man ![+] Killing ADB and restarting as root... enjoy!
when you get this message reboot your phone so that reboot process completes successfully

THUS YOU HAVE ROOTED YOUR PHONE !!!! NOW ENJOY !!
I WISH TO POST ANOTHER TUTORIAL ON HOW TO INSTALL CUSTOM ROMS IN YOUR ANDROIDS BUT YOU HAVE TO WAIT FOR  IT !!

* * IF YOU RUN INTO ANY PROBLEM JUST LEAVE A COMMENT I'LL WORK ON IT * *
** LEAVE A COMMENT IF YOU HAVE SUCCESSFULLY ROOTED YOUR DEVICE ** 




Monday 21 May 2012

Change Windows Boot Animation

Are you bored with the same windows 7 boot animation where 4 light spheres come and join to make the windows logo ?



Well i was . Then i searched many places to change the boot animation. Then I found a software on the net that can change the boot animation to anything you want. The software's name is Win7bootupdater. This software will change the boot animation very easily. All you have to do is cut a video loop that you want to display during booting. The video must be of maximum 105 frames long. Then output the cut video loop in jpg images in a folder. Then run the program. Select animation from the drop down menu under animation.Then select all the jpg sequential images. And the animation should be loaded. Remember the animation is a loop one and the looping starts from 60th frame. So cut your video accordingly !!! The link to the file :http://www.4shared.com/file/oSZpuJHF/Win7BootUpdater.html?


***If anyone wants a cool boot animation but cannot make one request me in the comment.. i will make one for you and upload it here !!! Have fun !!! ***

WHAT IS ROOTING YOUR ANDROID MOBILE


“What is rooting? Why should I root my Android device?” These are common questions that I get asked quite often. Today’s lesson is to talk to you about both the advantages and disadvantages of rooting your Android devices. But before we get started, a word of caution: rooting or modifying your phone in any way will void your manufacturer’s warranty and possibly “brick” it. What does “bricking” your device mean you ask? Exactly what you think… It means screwing up your phone software so badly that your phone can no longer function properly and is pretty much as useless as a brick. I do not in any way recommend anyone to root their Android device. This article is simply to introduce you to the subject of rooting and present you with both the pro’s and con’s so that you can make an educated decision on your own.
What is Rooting?
“Rooting” your device means obtaining “superuser” rights and permissions to your Android’s software. With these elevated user privileges, you gain the ability to load custom software (ROM’s), install custom themes, increase performance, increase battery life, and the ability to install software that would otherwise cost extra money (ex: WiFi tethering). Rooting is essentially “hacking” your Android device. In the iPhone world, this would be the equivalent to “Jailbreaking” your phone.
Why is it called Rooting?
The term “root” comes from the Unix/Linux world and is used to describe a user who has “superuser” rights or permissions to all the files and programs in the software OS (Operating System). The root user, because they have “superuser” privileges, can essentially change or modify any of the software code on the device. You see, your phone manufacturer/carrier only gives you “guest” privileges when you purchase your device. They do this for good reason… they don’t want you getting into certain parts of the software on your phone and screwing it up beyond repair. It makes it much easier for them to manage and update the devices if they lock it all down. This way, all the users are running the same unmodified version of the phone’s software. This makes it much easier for them to support the devices. But, for the tech-savvy crowd, only having “guest” privileges on your device is pretty lame and it locks down a lot of potentially useful features.

What are the Advantages of Rooting?

Custom Software (ROM’s)
You may have heard of people loading custom “ROM’s” on their devices. A “ROM” is the software that runs your device. It is stored in the “Read Only Memory” of your device. There are many great custom ROM’s available that can make your Android device look and perform drastically different. For instance, you might be stuck with an older Android device that is stuck on an older version of the Android OS and it is not getting any of the newer updated versions of Android. With a custom ROM, you could load up the latest and greatest available Android versions and bring that antiquated device up to par with some of the newer ones. There are lots of great ROM’s available for many different phones and it is up to you to find the one that best meets your needs. The best place that I have found to find custom ROM’s for Android devices is the XDA Developers Forums. The XDA community is filled with smartphone enthusiasts and developers for the Android platform. Check them out and see if you find any ROM’s that would meet your needs. [Link Here]
Custom Themes
Themes are basically the graphics that appear on your Android device. Rooting your device allows you the ability to fully customize just about every graphic on your device. You can load custom themes that totally change the look and feel of your device. Here are some examples:http://forum.xda-developers.com/forumdisplay.php?f=527
Kernel, speed, and battery
There are many custom ROM’s and apps available for rooted devices that will allow you to drastically improve the performance (speed) and also extend battery life on your device. A lot of developers tweak the kernels (layer of code that handles communication between the hardware and software) for added performance, battery life, and more.
Baseband
Rooting your device grants you the ability to update the Basebands on your smartphone. The Baseband is what controls the radio on your device. By updating to the latest Basebands, you can potentially improve both the signal and quality of your phone calls.
Latest Versions of Android
As mentioned earlier, custom ROM’s can allow you to update to thelatest version of the Android OS before they are officially released. This is a great feature for those who are tech-savvy and want to stay on top of the latest and greatest software updates before it hits the mainstream crowd. This is also useful if you have an outdated device that is no longer being updated by the manufacturer.
Backing up your device
The ability to easily backup all of your Apps and Data is one feature that is sorely missed on the stock build of Android devices. But if you root your device, backing up everything on your device (both apps and data) becomes a simple task. Titanium Backup is a must have app for anyone who has rooted their devices and wants to backup and restore their phones. [Market Link]
Unlocking Additional Features
By rooting your Android device you also gain the ability to unlock some features that your carrier may charge for. One example is enabling free WiFi and USB tethering, which many carriers charge money for. Now, I’m not suggesting you do this. But I did want to make you aware of the fact that it is possible to do this. However, your carrier may catch on to the fact that you are using your device as a free WiFi hotspot and figure out a way to charge you for it. So use this feature at your own risk!

WHAT ARE    THE    DISADVANTAGES     OF    ROOTING

Bricking
The number one reason not to root your device is the potential risk of “bricking” it. As mentioned earlier, “bricking” your device means screwing up your phone software so badly that your phone can no longer function properly and is pretty much as useless as a brick. You would likely need to purchase a new Android device since the manufacturer of your device will void the warranty after any attempts at rooting.
Security
There is an increased risk of unknowingly installing malicious software when you root an Android device. Root access circumvents the security restrictions that are put in place by the Android OS. There isn’t really an effective way to tell just what the application intends to do with that “superuser” power. You are putting a lot of trust into the developer’s hands. In most cases, these applications are open source and the community can take a look at the source code to assess the risk. But, nevertheless, the risk is there. Fortunately, malicious software on rooted devices hasn’t really been a problem as of yet. But I thought it was worth mentioning since this could be a potential risk in the future. I’d recommend installing an Anti-Virus and Security App just to be safe. Lookout Mobile Security seems to be one of the best ones available at the moment. [Link Here]
Can I Unroot my device if I change my mind?
Yes. You would need to do some research for your specific type of device. As mentioned earlier, the XDA Developer Forums is the best place to start. [Link Here]
How do I learn how to root my device?
Unfortunately, there is no easy way to teach someone how to root their Android device. Each device has a unique method to rooting and some research most be done on your part. As I mentioned earlier, the best place to start would be the XDA Developer Forums. [Link Here]  Another option is to simply Google your model phone and the term root (ex. “HTC EVO root”). Have fun and good luck to all of you! I hope you found this lesson on rooting to be helpful. If you have any questions, please feel free to leave a comment below.

Friday 18 May 2012

iPhone DFU Mode Explained & How To Enter & Exit From it

What is iPhone DFU mode?

DFU mode is a state that you can put your iPhone into where it can interface with iTunes but does not load the iPhone operating system or boot loader (this is what really differs DFU mode from recovery mode). DFU stands for Device Firmware Update.

What is DFU mode used for?

The primary reason people need to access DFU mode on their iPhone is to change the firmware on the device. This can serve to downgrade to a prior iPhone firmware and operating system, or to use a custom firmware that is required for a jailbreak or SIM unlock. For instance, if you got the iPhone OS 4 download installed and decided you would rather have a prior version of the firmware on your iPhone, you would need to do this through DFU mode.

How to enter iPhone DFU mode:-

  • Connect the iPhone to your computer and launch iTunes
  • Turn the iPhone off (hold down the power button at the top of the iPhone)
 
  • Hold down the sleep/power button and home button together for exactly 10 seconds, then release the power button
  • Continue to hold down the Home button until a message appears in iTunes telling you an iPhone in recover mode has been detected

  • When you are in DFU mode your iPhone screen will be completely black

iphone dfu mode
Even though the screen is black, that doesn’t mean the device can’t be interfaced with either iTunes or a custom firmware client (for jailbreaking, etc).
Remember that if you see the restore logo, iTunes logo, or any message on the iPhone screen, you are not in DFU mode but standard Recovery Mode. Again, DFU mode is signified by having a completely black screen on the device. If anything else is the case, repeat the steps above until you enter into DFU mode successfully.

Exit DFU mode on iPhone:-

The simplest way to exit out of DFU mode is to hold down the Home and sleep/power buttons on the iPhone while connected to iTunes. Then just hit the power button as and this should reboot the device as usual.
And if you’re curious, yes this works all the same on an iPod touch.
The most common use for DFU mode is to jailbreak. It’s not unusual for people to buy an existing iPhone and jailbreak the device to use the phone on another network or overseas, this is often a cheaper way to get an iPhone than to sign into a contract with AT&T, pay roaming charges, or pay the full iPhone 4 price.

How to Create a CON folder in Windows??

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?
The answer is NO and YES!

NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.
What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.
 
YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.
 
1. Go to command prompt

2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE) C:\>md \\.\e:\con (NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.)


3. To delete the folder use the following command C:\>rd \\.\e:\con (NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.)


How To Use Windows 7 For 1 Year Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 for 120 days without activation. This is actually possible using the "slmgr -rearm" command which will extend the grace period from 30 days to 120 days.

Now, today I'll show you a small registry trick to  use Windows 7 for almost 1 year..!!

Step-1. Goto “Start Menu -> All Programs -> Accessories“.
Right click on “Command Prompt” and select “Run as Administrator“ (If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2)
 
Step-2. Now type the slmgr -rearm command and hit enter.

Step-3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
 
Step-4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

Step-5. In right-side pane, change value of SkipRearm to 1.
 
Step-6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.

Access Your Facebook Account with 3 Passwords

Did you know that you can login to your Facebook account using 3 different passwords? Seems interesting isn’t it? Yep! Unlike any other online account which has only one password to access, Facebook lets you log in using 3 different variants of your password.

Only a few Facebook users are aware of this fact but, for many others this might seem a bit surprising. Facebook accepts the following forms of your password:

1. Your Original Password:

Let me explain this to you with the following example. Assume that your default Facebook password that you created during the sign-up process is: myFacebookPass

2. Password with the Case Toggled:

In the above password the letters ‘F’ and ‘P’ are in uppercase and the remaining are in the lowercase. If you TOGGLE the case where all the UPPERCASE characters are converted into the lowercase and vice versa, your default password “myFacebookPass” would become: MYfACEBOOKpASS
Now if you log in using the above toggled password, your Facebook will accept it and welcomes you! This is the first variation of your default password which is accepted by Facebook.

3. Password with the First Letter Capitalized:

If the first character of your password is in the lowercase, you may just change that first letter to UPPERCASE and Facebook will again accept it and let you in. As in case of the above example where your default password is “myFacebookPass”, if you just change the first letter to UPPERCASE your password would be “MyFacebookPass” and this should work fine as well:

Please note that this option will work for Mobile users only!

How it Works?

Now, you all know that Facebook can be accessed using 3 different passwords. But you may be curious to know the actual reason behind it.
Well, this is definitely not because Facebook has a bug or a serious vulnerability. In fact this is just an option provided by Facebook itself to make the sign-in process easier for the users. Here’s how:
The most common reason for the authentic logins to be rejected is when the CAPS LOCK is ON. This is where the first variation comes in handy. That means, when the CAPS LOCK is ON the case gets reversed (toggled) for your password but Facebook will accept this as well.
In case of mobile, users it is a common for the first letter of the password to get capitalized which often leads to the login failure. So, in order to tackle this issue, Facebook will also accept the password where only the first letter is capitalized.
Thus if the CAPS LOCK is accidentally enabled, the toggled password feature would still let you log in to your account!

How To Get Online Protection

Internet, which was invented to simplify lives of people with its instant approach and quick service delivery, now seems to be troubling them. The internet savvy users, venturing into cyberspace, on a lookout for information and prompt services, are now whining about the thriving security threats.
With threats thronging out in the World Wide Web and rising dependence on internet to fulfill the info needs, it gets almost indispensable for a user to acquire a protection mechanism which minimizes risks and capitalizes individual efforts. Let’s go through some quick conducts to check such risks online:

1.      Get Security Software
A simple security program can protect your computer from viruses, malware, and spywares. You don’t have to shell out your money for better security. Free antivirus software like Avira Free Antivirus or AVG Anti-Virus may just work fine for your computer. Experts recommend procuring a number of free cyber-protection tools instead of getting just one. Also, get a firewall.

2.      Smart passwords
Use passwords that are difficult for cyber-criminals to guess. Use lengthy passwords with combination of symbols and numbers for different accounts. Change your passwords more often. Even the software giant Microsoft recommends changing passwords every three months.

3.      Get cagey of WiFi
Using Public WiFi is convenient, but it’s not certainly the safest. Accessing work email, bank accounts or your social accounts may put your privacy under question, while using free WiFi. Enhance your security by logging into secure sites with web addresses starting with “https”.

4.      Be careful while clicking:
Spam emails can subterfuge as mails from your colleagues or businesses. Don’t click on suspicious links in spam emails as they could be a ‘phishing attack’. Type the website address in a separate browser window in case you wish to check the account. Also do not respond to emails promising to send free gifts won by you, seeking your personal information like Address, Bank Account no., passwords, etc.

5.      Evaluate the risks
Know how your information is being used while surfing online. Learn how the World Wide Web tracks you and use the data. Is your current geographical location visible on your Social Networking accounts? Look for steps to hide it.

6.      Remove your trails
Browsing privately gives user the peace of mind that his information is safe. Put your web browser in ‘Private Mode’. Doing so clears the history and cookies automatically. But the websites visited by you may still know your identity. Using updated versions of search engines like Mozilla Firefox and Google Chrome, can further restrict the entry of spywares and malwares into your computer systems.

7.      Intellectual Thinking
Understand the threats.  Don’t click and download frantically. Keep your phones password-protected. Don’t reveal your full name, date of birth, family members’ maiden names, Social Security number and other private information on social networking sites.

Computer Security Software

Computer Security Software



Virus Scanners-

A virus scanner is essentially software that tries to prevent a virus from infecting your system.In general, virus scanners work in two ways. The first method is that they contain a list of all known
virus definitions. The virus definitions are simply files that list known viruses, their file size, properties, and behavior. Generally, one of the services that vendors of virus scanners provide is a periodic update of this file. This list is typically in a small file, often called a .dat file (short for data). When you update your virus definitions, what actually occurs is that your current file is replaced by the more recent one on the vendor’s website. The antivirus program can then scan your PC, network, and incoming email for known virus files. Any file on your PC or attached to an email is compared to the virus definition file to see whether there are any matches. With emails, this can be done by looking for specific subject lines and content. Known virus files often have specific phrases in the subject line and the body of the messages they are attached to. Yet viruses and worms can have a multitude of headers, some of which are very common, such as re:hello or re:thanks. Scanning against a list of known viruses alone would result in many false positives.
Therefore, the virus scanner also looks at attachments to see whether they are of a certain size
and creation date that matches a known virus or whether it contains known viral code. The file size,
creation date, and location are the telltale signs of a virus.

Virus-Scanning Techniques-

In general, there are five ways a virus scanner might scan for virus infections. Some of these were
mentioned in the previous section, but they are outlined and defined below:

■ Email and attachment scanning: Since the primary propagation method for a virus is email,
email and attachment scanning is the most important function of any virus scanner. Some virus
scanners actually examine your email on the email server before downloading it to your machine.
Other virus scanners work by scanning your emails and attachments on your computer
before passing it to your email program. In either case, the email and its attachments should be
scanned prior to you having any chance to open it and release the virus on your system.
■ Download scanning: Anytime you download anything from the Internet, either via a Web link
or through some FTP program, there is a chance you might download an infected file.
Download scanning works much like email and attachment scanning, but does so on files you
select for downloading.
■ File scanning: This is the type of scanning in which files on your system are checked to see
whether they match any known virus. This sort of scanning is generally done on an on-demand
basis instead of an ongoing basis. It is a good idea to schedule your virus scanner to do a
complete scan of the system periodically. I personally recommend a weekly scan, preferably at
a time when no one is likely to be using the computer.
■ Heuristic Scanning: This is perhaps the most advanced form of virus scanning. This sort of
scanning uses rules to determine whether a file or program is behaving like a virus and is one of
the best ways to find a virus that is not a known virus. A new virus will not be on any virus
definition list, so you must examine its behavior to determine whether it is a virus. However,
this process is not foolproof. Some actual virus infections will be missed, and some nonvirus
files might be suspected of being a virus.
■ Sandbox: Another approach is the sandbox approach. This basically means that you have a
separate area, isolated from the operating system, in which a download or attachment is run.
Then if it is infected, it won’t infect the operating system.
One way to accomplish this is for the operating system to set aside a protected area of memory
to open the suspected file and to monitor its behavior. This is not 100% effective, but it is far
safer than simply opening files on your system and hoping there is no infection.
A related concept is called a “sheep dip” machine. This is useful in corporate networks. You set
up a system that is identical in configuration to your standard workstations. However, this sheep
dip machine is not networked. Suspect files are opened first on this system. Then the system is
monitored for a period of time for signs of infection. Once the file has cleared this check, it can
then be opened on normal workstations.
A simple way to do this in a home or small office is to set up a virtual machine on your
computer and to open suspected attachments or downloads in the virtual machine first. If they
are okay, then open them on your main system.

Firewalls-

A firewall is, in essence, a barrier between your network and the outside world. At a minimum, it will filter incoming packets based on certain parameters such as packet size, source IP address, protocol, and destination port. Linux and Windows (beginning with Windows XP and in all subsequent Windows versions) ship with a simple firewall. For Windows, the firewall in Windows 7 was expanded to handle filtering both inbound and outbound traffic.
In an organizational setting, you will want a dedicated firewall between your network and the outside
world. This might be a router that also has built-in firewall capabilities. (Cisco Systems is one company that is well known for high-quality routers and firewalls.) Or, it might be a server that is dedicated solely to running firewall software. Selecting a firewall, however, is an important decision. If you lack the expertise to make that decision, then you should arrange for a consultant to assist you in this respect.

Benefits and Limitation of Firewalls
A firewall, no matter what type you get (types are described in the next section), is basically a tool to
block certain traffic. A set of rules determine what traffic to allow in, and what traffic to block. Obviously,a  firewall is a critical piece of your security strategy. I cannot even conceive of any reason to run any system without one. However, it is not a panacea for security. It cannot block every attack. For example, a firewall won’t stop you from downloading a Trojan horse. It also cannot stop internal
attacks. But a firewall can be an excellent way to stop a denial of service attack or to prevent a hacker
from scanning the internal details of your network.

Firewall Types and Components
Up to this point, most discussion of firewalls has focused on packet-filtering firewalls. However, there
are several other types of firewalls or components to firewalls that are listed below.
■ Screening firewall
■ Application gateway
■ Circuit-level gateway
The following sections will discuss each of these and assess the advantages and disadvantages of each.

Screening Firewall
Screening firewalls, the most basic type of firewall, are simply another name for packet-filtering firewalls. This type of firewall works in the network layer of the OSI model (see Chapter 2, “Networks and the Internet”). It simply examines incoming packets and either allows or denies them entrance based on a set of rules that were put into its configuration. They can filter packets based on packet size, protocol type used, destination IP address, source IP address, destination port, source port, and so forth. For example, a packet filter might deny all traffic on ports 1024 and up, or it might block all incoming traffic using the TFTP protocol. You can use incoming and outgoing filters to dictate what information passes into or out of your local network.
Many routers offer this type of firewall option. These firewalls are usually very easy to configure and
quite inexpensive. As mentioned, some operating systems include built-in packet-filtering capabilities.
There are a few disadvantages to the screening/packet-filtering firewall solution. One disadvantage is
that they do not actually examine the packet or compare it to previous packets; therefore, they are quite susceptible to either a ping flood or SYN flood. They also do not offer any user authentication. Additionally, in many cases, a packet-filtering firewall will be used as a bastion host. A bastion host is a single point of contact between the Internet and a private network. It usually will only run a limited number of services (those that are absolutely essential to the private network) and no others.

Application Gateway
An application gateway (also known as application proxy or application-level proxy) is a program that runs on a firewall. When a client program, such as a Web browser, establishes a connection to a destination service, such as a web server, it connects to an application gateway, or proxy. The client then negotiates with the proxy server in order to gain access to the destination service. In effect, the proxy establishes the connection with the destination behind the firewall and acts on behalf of the client, hiding and protecting individual computers on the network behind the firewall. This process actually creates two connections. There is one connection between the client and the proxy server and another connection between the proxy server and the destination.
Once a connection is established, the application gateway makes all decisions about which packets to
forward. Since all communication is conducted through the proxy server, computers behind the
firewall are protected.
With an application gateway, each supported client program requires a unique program to accept client application data. This sort of firewall allows for individual user authentication, which makes them quite effective at blocking unwanted traffic. However, a disadvantage is that these firewalls use a lot of system resources and are susceptible to SYN floods and ping floods.

Circuit-Level Gateway
A circuit-level gateway is similar to an application gateway but is more secure and generally implemented on high-end equipment. A circuit-level gateway relays a TCP connection but does no additional processing or filtering of the protocol (Wack, 1995). In this system, your username is checked and granted access before the connection to the router is established. This means that you as an individual, either by username or IP address, must be verified before any further communication can take place. Once this verification takes place and the connection between the source and destination is established, the firewall simply passes bytes between the systems. A virtual “circuit” exists between the internal client and the proxy server. Internet requests go through this circuit to the proxy server, and the proxy server delivers those requests to the Internet after changing the IP address. External users only see the IP address of the proxy server. Responses are then received by the proxy server and sent back through the circuit to the client. While traffic is allowed through, external systems never see the internal systems.
While highly secure, this approach may not be appropriate for some public situations, such as e-commerce sites. This type of firewall does not allow features, such as URL filtering. They also frequently offer only limited auditing capabilities.

How Firewalls Examine Packets
In addition to how the firewall operates, you can further differentiate firewalls based on how they
examine incoming packets. There are two main approaches to this task, and each is briefly examined
below.

Stateful Packet Inspection
The stateful packet inspection (SPI) firewall will examine each packet, denying or permitting access
based not only on the examination of the current packet, but also on data derived from previous packet in the conversation. This means that the firewall is aware of the context in which a specific packet was sent. This makes these firewalls far less susceptible to ping floods and SYN floods, as well as being less susceptible to spoofing. For example, if the firewall detects that the current packet is an ICMP packet and a stream of several thousand packets have been continuously coming from the same source IP, it is clearly a denial of service attack and the packets will be blocked.
The SPI firewall can also look at the actual contents of the packet. This allows for some very advanced filtering capabilities. Most high-end firewalls use the stateful packet inspection method; when possible, this is the recommended type of firewall.
Stateless Packet Inspection
Stateless packet inspection does not involve actually examining the contents of each packet, which is a significant weakness in using such an inspection technology. Also, the stateless packet inspection does not examine a packet within the context of an ongoing TCP conversation. It does not know what the preceding or subsequent packets are doing, thus making it vulnerable to ping floods and other denial of service attacks.

Firewall Configurations
In addition to the various types of firewalls, there are also various configuration options. The type of
firewall tells you how it will evaluate traffic and hence decide what to allow and not to allow. The
configuration gives you an idea of how that firewall is set up in relation to the network it is protecting.
Some of the major configurations/implementations for firewalls include the following:
■ Network host-based
■ Dual-homed host
■ Router-based firewall
■ Screened host

Each of these is discussed in the following sections:
Network Host-Based
A network host-based firewall is a software solution installed on an existing machine with an existing operating system. The most significant concern in using this type of firewall is that no matter how good the firewall solution is, it is contingent upon the underlying operating system. In such a situation, it is absolutely critical that the machine hosting the firewall have a hardened operating system.
Dual-Homed Host
A dual-homed host is a firewall running on a server with at least two network interfaces. The server acts as a router between the network and the interfaces to which it is attached. To make this work, the automatic routing function is disabled, meaning that an IP packet from the Internet is not routed directly to the network. You can choose what packets to route and how to route them. Systems inside and outside the firewall can communicate with the dual-homed host but cannot communicate directly with each other.
Router-Based Firewall
As was previously mentioned, you can implement firewall protection on a router. In larger networks
with multiple layers of protection, this is commonly the first layer of protection. Although one can
implement various types of firewalls on a router, the most common type used is packet filtering. If you use a broadband connection in your home or small office, you can get a packet-filtering firewall router to replace the basic router provided to you by the broadband company. In recent years, router-based firewalls have become increasingly common and are in fact the most common firewall used today.
Screened Host
A screened host is really a combination of firewalls. In this configuration, you use a combination of a
bastion host and a screening router. The screening router adds security by allowing you to deny or
permit certain traffic from the bastion host. It is the first stop for traffic, which can continue only if the screening router lets it through.

Firewall Logs:-
Firewalls are also excellent tools when attempting to ascertain what has happened after an incident
occurs. Almost all firewalls, regardless of type or implementation, will log activity. These logs can
provide valuable information that can assist in determining the source of an attack, methods used to
attack, and other data that might help either locate the perpetrator of an attack or at least prevent a
future attack using the same techniques. Any security-conscious network administrator should make it a routine habit to check the firewall logs.

Antispyware- 



This is an important element of computer security software that was at one
time largely ignored. Even today, not enough people take spyware seriously or guard against it. Most
antispyware works by checking your system for known spyware files. Each application must simply be checked against a list of known spyware. This means that you must maintain some sort of subscription service so that you can obtain routine updates to your spyware definition list. Most antivirus solutions now also check for antispyware.
In today’s Internet climate, running antispyware is as essential as running antivirus software. Failing to do so can lead to serious consequences. Personal data, and perhaps sensitive business data, could easily be leaking out of your organization without your knowledge. And, as was pointed out earlier in this book, it is entirely possible for spyware to be the vehicle for purposeful industrial espionage.

Intrusion-Detection Software-
Intrusion-detection software (IDS) has become much more widely used in the last few years. Essentially,
an IDS will inspect all inbound and outbound port activity on your machine/firewall/system and
look for patterns that might indicate an attempted break-in. For example, if the IDS finds that a series of ICMP packets were sent to each port in sequence, this probably indicates that your system is being
scanned by network-scanning software, such as Cerberus. Since this is often a prelude to an attempt to breach your system security, it can be very important to know that someone is performing preparatory steps to infiltrate your system.
IDS Categorization
There are a number of ways in which IDS systems can be categorized. The most common IDS categorizations
are as follows:
■ Misuse detection versus anomaly detection
■ Passive systems versus reactive systems
■ Network-based systems versus host-based systems

Other Preemptive Techniques-

Besides IDS, antivirus, firewalls, and honey pots, there are a variety of preemptive techniques an
administrator can use to attempt to reduce the chances of a successful attack being executed against his or her network.
Intrusion Deflection
This method is becoming increasingly popular among the more security-conscious administrators. The essence of it is quite simple. An attempt is made to attract the intruder to a subsystem set up for the purpose of observing him. This is done by tricking the intruder into believing that he has succeeded in accessing system resources when, in fact, he has been directed to a specially designed environment.
Being able to observe the intruder while he practices his art will yield valuable clues and can lead to his arrest.
This is often done by using what is commonly referred to as a honey pot. Essentially, you set up a fake system, possibly a server that appears to be an entire subnet. You make that system look very attractive by perhaps making it appear to have sensitive data, such as personnel files, or valuable data, such as account numbers or research. The actual data stored in this system is fake. The real purpose of the system is to carefully monitor the activities of any person who accesses the system. Since no legitimate user ever accesses this system, it is a given that anyone accessing it is an intruder.
Infiltration
This method refers to efforts on the part of the administrator or security specialist to acquire information from various illicit sources. Many administrators rely solely on various security bulletins from vendors. With infiltration, the administrator proactively seeks out intelligence on potential
threats/groups. In other words, it is not a software or hardware implementation, but rather a process of infiltrating hacker/cracker online groups in order to keep tabs on what sort of vulnerabilities are
currently being exploited by these groups and what target systems are considered attractive targets.
This form of intrusion detection is not widely used for two reasons. The first reason is that it is quite
time-consuming. The second reason is that it requires spying skills, which many administrators may
not possess.
Intrusion Deterrence
This method involves simply trying to make the system seem like a less-palatable target. In short, an
attempt is made to make any potential reward from a successful intrusion attempt appear more difficult than it is worth. This approach includes tactics such as attempting to reduce the apparent value of the current system’s worth through camouflage. This essentially means working to hide the most valuable aspects of the system. The other tactic in this methodology involves raising the perceived risk of a potential intruder being caught. This can be done in a variety of ways, including conspicuously displaying warnings and warning of active monitoring. The perception of the security of a system can be drastically improved, even when the actual system security has not been improved.

Cyber Stalking Fraud and Abuse

-:Cyber Stalking Fraud and Abuse:-
There are many avenues for fraud on the Internet. Here, we will explore what the various
major types of fraud are, what the law says, and what you can do to protect yourself. Sometimes, Internet fraud does not rely on in-depth technological expertise. Internet fraud merely uses the computer as a venue for many of the same fraud schemes that have been perpetrated throughout history.

How The Internet Fraud Works :-

There are a variety of ways that a fraud can be perpetrated via the Internet. The Securities and
Exchange Commission lists several types of Internet fraud on their website, we will briefly discuss
each of those and others.

Investment Offers - These are nothing new. Even some legitimate stockbrokers make their living by cold calling, the process of simply calling people (perhaps from the phone book), and trying to get them to invest in a specific stock. This practice is employed by some legitimate firms, but it is also a favorite
con game for perpetrators of fraud. The Internet has allowed investment offers—both genuine and
fraudulent—to be more easily disseminated to the general public. Most readers are probably familiar
with investment offers flooding their inbox on a daily basis. Some of these email notifications entice
you to become directly involved with a particular investment plan; other emails offer seemingly
unbiased information from investors, free of charge. (Unfortunately, much of this advice is not as
unbiased as it might appear to be.) While legitimate online newsletters can help investors gather
valuable information, keep in mind that some online newsletters are fraudulent.

The U.S. Securities and Exchange Commission lists several tips for avoiding such scams:-
1. Consider the source. Especially if you are not well versed in the market, make sure you accept
advice only from well-known and reputable stock analysts.
2. Independently verify claims. Do not simply accept someone else’s word about anything.
3. Research. Read up on the company, the claims about the company, its stock history, and so
forth.
4. Beware of high-pressure tactics. Legitimate stock traders do not pressure customers into
buying. They help customers pick stocks that customers want. If you are being pressured, that is
an indication of potential problems.
5. Be skeptical. A healthy dose of skepticism can save you a lot of money. Or, as the saying goes,
“If it’s too good to be true, it probably isn’t.”
6. Make sure you thoroughly research any investment opportunity.

Auction Frauds - Online auctions, such as eBay, can be a wonderful way to find merchandise at very good prices. However, any auction site can be fraught with peril. Will you actually get the merchandise you ordered? Will it be “as advertised”? Most online auctions are legitimate, and most auction websites take precautions to limit fraud on their website. But problems
still occur.
The U.S. Federal Trade Commission (FTC) lists the following four categories of
online auction fraud:-
■ Failure to send the merchandise
■ Sending something of lesser value than advertised
■ Failure to deliver in a timely manner
■ Failure to disclose all relevant information about a product or terms of the sale 
The FTC also lists three other areas of bidding fraud that are growing in popularity on the Internet.
From the FTC website:-
Shill bidding, when fraudulent sellers (or their “shills”) bid on the seller’s items to drive up the
price.
Bid shielding, when fraudulent buyers submit very high bids to discourage other bidders from
competing for the same item. The fake buyers then retract their bids so that people they know
can get the item at a lower price.
Bid siphoning, when con artists lure bidders off legitimate auction sites by offering to sell the
“same” item at a lower price. Their intent is to trick consumers into sending money without
proffering the item. By going off-site, buyers lose any protections the original site may provide,
such as insurance, feedback forms, or guarantees.

Identity Theft - Identity theft is a growing problem and a very troubling one. The concept is rather simple, though the process can be complex, and the consequences for the victim can be quite severe. The idea is simply for one person to take on the identity of another. This is usually attempted to make purchases; but identity theft can be done for other reasons, such as obtaining credit cards in the victim’s name, or even driving licenses. If the perpetrator obtains a credit card in someone else’s name, then he can purchase products and the victim of this fraud is left with debts she was not aware of and did not authorize.

Phishing - One of the more common ways to accomplish identity theft is via a technique called phishing, which is the process of trying to induce the target to provide you with personal information. For example the attacker might send out an email purporting to be from a bank, and telling recipients that there is a problem with their bank account. The email then directs them to click on a link to the bank website where they can login and verify their account. However, the link really goes to a fake website set up by the attacker. When the target goes to that website and enters his information, he will have just given his username and password to the attacker.

Cyber Stalking - Stalking in general has received a great deal of attention in the past few years. The primary reason is that stalking has often been a prelude to violent acts, including sexual assault and homicide. For this reason, many states have passed a variety of antistalking laws. However, stalking has expanded into cyberspace.

Protecting Yourself Against Cyber Crime :-

Now that you know about the various frauds that are prevalent on the Internet and have looked at the
relevant laws, you might be wondering what you can do to protect yourself. There are several specific steps you can take to minimize the chances of being the victim of Internet crime. There are also some clear guidelines on how you should handle the situation, should you become a victim.

:Protecting against Investment Fraud:

To protect yourself against investment fraud, follow these guidelines:
1. Only invest with well-known, reputable brokers.
2. If it sounds too good to be true, then avoid it.
3. Ask yourself why this person is informing you of this great investment deal. Why would a
complete stranger decide to share some incredible investment opportunity with you?
4. Remember that even legitimate investment involves risk, so never invest money that you cannot
afford to lose.

:Protecting against Identity Theft:

When the issue is identity theft, your steps are clear:
1. Do not provide your personal information to anyone if it is not absolutely necessary. This rule
means that when communicating on the Internet with anyone you do not personally know, do
not reveal anything about yourself; not your age, occupation, real name, nothing.
2. Destroy documents that have personal information on them. If you simply throw away bank
statements and credit card bills, then someone rummaging through your trash can get a great
deal of personal data. You can obtain a paper shredder from an office supply store or many
retail department stores for less than $20. Shred these documents before disposing of them.
This rule may not seem like it is related to computer security, but information gathered through
nontechnical means can be used in conjunction with the Internet to perpetrate identity theft.
3. Check your credit frequently. If you see any items you did not authorize, that is a clear indication that you might be a victim of identity theft.
4. If your state has online driving records, then check yours once per year. If you see driving infractions that you did not commit, this evidence is a clear sign that your identity is being used
by someone else.